blob: d56d7cc547f607d716d796a1ced2dfd7c0fe8818 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200704-07">
<title>libwpd: Multiple vulnerabilities</title>
libwpd is vulnerable to several heap overflows and an integer overflow.
<product type="ebuild">libwpd</product>
<announced>April 06, 2007</announced>
<revised>April 06, 2007: 01</revised>
<package name="app-text/libwpd" auto="yes" arch="*">
<unaffected range="ge">0.8.9</unaffected>
<vulnerable range="lt">0.8.9</vulnerable>
libwpd is a library used to convert Wordperfect documents into other
libwpd contains heap-based overflows in two functions that convert
WordPerfect document tables. In addition, it contains an integer
overflow in a text-conversion function.
<impact type="normal">
An attacker could entice a user to convert a specially crafted
WordPerfect file, resulting in a crash or possibly the execution of
arbitrary code with the rights of the user running libwpd.
There is no known workaround at this time.
All libwpd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-text/libwpd-0.8.9&quot;</code>
<uri link="">CVE-2007-0002</uri>
<uri link="">CVE-2007-1466</uri>
<metadata tag="requester" timestamp="Mon, 02 Apr 2007 22:18:42 +0000">
<metadata tag="submitter" timestamp="Tue, 03 Apr 2007 12:29:29 +0000">
<metadata tag="bugReady" timestamp="Tue, 03 Apr 2007 22:29:58 +0000">